Results 21 to 30 of about 96,237 (302)

Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH

open access: yesIET Information Security, 2021
The supersingular isogeny Diffie–Hellman key exchange protocol (SIDH) was introduced by Jao and De Feo in 2011. SIDH operates on supersingular elliptic curves defined over Fp2, where p is a large prime number of the form p=4eA3eB−1 and eA and eB are ...
Daniel Cervantes‐Vázquez   +2 more
doaj   +1 more source

Superposition Attacks on Cryptographic Protocols [PDF]

open access: yes, 2014
Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece of information.
Ivan Damgård   +4 more
openaire   +5 more sources

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

CRYPTOGRAPHIC PROTOCOLS SPECIFICATION AND VERIFICATION TOOLS - A SURVEY

open access: yesICTACT Journal on Communication Technology, 2017
Cryptographic protocols cannot guarantee the secure operations by merely using state-of-the-art cryptographic mechanisms. Validation of such protocols is done by using formal methods. Various specialized tools have been developed for this purpose and are
Amol H Shinde, A J Umbarkar, N R Pillai
doaj   +1 more source

Reconstructing a lightweight security protocol in the radio‐frequency identification systems

open access: yesIET Computers & Digital Techniques, 2023
Nowadays, the Internet of things (IoT) has extensively found its way into everyday life, raising the alarm regarding data security and user privacy. However, IoT devices have numerous limitations that inhibit the implementation of optimal cost‐effective ...
Alireza Abdellahi Khorasgani   +2 more
doaj   +1 more source

Denial-of-Service Resistance in Key Establishment [PDF]

open access: yes, 2007
Denial of Service (DoS) attacks are an increasing problem for network connected systems. Key establishment protocols are applications that are particularly vulnerable to DoS attack as they are typically required to perform computationally expensive ...
Boyd, Colin   +4 more
core   +2 more sources

A Social-Network-Based Cryptocurrency Wallet-Management Scheme

open access: yesIEEE Access, 2018
Effective cryptocurrency key management has become an urgent requirement for modern cryptocurrency. Although a large body of cryptocurrency wallet-management schemes has been proposed, they are mostly constructed for specific application scenarios and ...
Shuangyu He   +7 more
doaj   +1 more source

Adaptable Cryptographic Primitives in Blockchains via Smart Contracts

open access: yesCryptography, 2022
Blockchain-based platforms utilise cryptographic protocols to enforce the correct behaviour of users, as well as to guarantee a sufficient level of protection against malicious adversaries.
Riccardo Longo   +4 more
doaj   +1 more source

Current Status and Future Development of Quantum Cryptographic Protocols

open access: yes中国工程科学, 2022
Quantum computing has the capability of parallel computing and is superior to classical computing in solving some specific problems. Once a large-scale quantum computer is developed, the security of classical cryptographic algorithms and protocols, which
Zhang Xue   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy